Enhanced security-aware technique and ontology data access control in cloud computing

被引:7
作者
Kiran, Gangasandra Mahadevaiah [1 ]
Nalini, Narasimhaiah [2 ]
机构
[1] Shridevi Inst Engn & Technol, Dept Comp Sci Engn, Tumakuru 572106, Karnataka, India
[2] NITTE Meenakshi Inst Technol, Dept Comp Sci Engn, Bengaluru 560064, Karnataka, India
关键词
advanced encryption standard; cloud computing; data encryption standard and security-aware ontology access control; ontology data access control; DATA-STORAGE; CONTROL MODEL; MANAGEMENT;
D O I
10.1002/dac.4554
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, security and data access control are some of the major concerns in the cloud storage unit, especially in the medical field. Therefore, a security-aware mechanism and ontology-based data access control (SA-ODAC) has been developed to improve security and access control in cloud computing. The model proposed in this research work is based on two operational methods, namely, secure awareness technique (SAT) and ontology-based data access control (ODAC), to improve security and data access control in cloud computing. The SAT technique is developed to provide security for medical data in cloud computing, based on encryption, splitting and adding files, and decryption. The ODAC ontology is launched to control unauthorized persons accessing data from storage and create owner and administrator rules to allow access to data and is proposed to improve security and restrict access to data. To manage the key of the SAT technique, the secret sharing scheme is introduced in the proposed framework. The implementation of the algorithm is performed by MATLAB, and its performance is verified in terms of delay, encryption time, encryption time, and ontology processing time and is compared with role-based access control (RBAC), context-aware RBAC and context-aware task RBAC, and security analysis of advanced encryption standard and data encryption standard. Ultimately, the proposed data access control and security scheme in SA-ODAC have achieved better performance and outperform the conventional technique.
引用
收藏
页数:21
相关论文
共 30 条
[1]  
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[2]  
[Anonymous], 2015, INDIAN J SCI TECHNOL
[3]  
Auxilia M., 2016, INDIAN J SCI TECHNOL, V9, P1, DOI DOI 10.17485/ijst/2016/v9i23/95148
[4]   Developing A Secure Cloud Storage System for Storing IoT Data by Applying Role Based Encryption [J].
Bokefode, Jayant D. ;
Bhise, Avdhut S. ;
Satarkar, Prajakta A. ;
Modani, Dattatray G. .
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 :43-50
[5]  
Choi C., 2012, J Internet Serv Inf Secur, V2, P54
[6]   Ontology-based access control model for security policy reasoning in cloud computing [J].
Choi, Chang ;
Choi, Junho ;
Kim, Pankoo .
JOURNAL OF SUPERCOMPUTING, 2014, 67 (03) :711-722
[7]   Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations [J].
Esposito, Christian .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 :124-136
[8]   One secure data integrity verification scheme for cloud storage [J].
Fan, Yongkai ;
Lin, Xiaodong ;
Tan, Gang ;
Zhang, Yuqing ;
Dong, Wei ;
Lei, Jing .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :376-385
[9]   Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing [J].
Fatima, Shahin ;
Ahmad, Shish .
INTERNATIONAL JOURNAL OF E-COLLABORATION, 2020, 16 (01) :1-15
[10]  
Ghosh S, 2018, APPL SCI, V8, P11